Comparing proxy servers and packet-filtering firewalls

In the world of security, judging proxy servers and packet-filtering firewalls together is like comparing apples and oranges. But that won't stop network security expert Mike Chapple from giving such comparisons a try.

By submitting my Email address I confirm that I have read and accepted the Terms of Use and Declaration of Consent.

By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

In the world of security, judging proxy servers and packet-filtering firewalls together is like comparing apples and oranges. While proxy servers play a limited security function, their basic role is to boost performance. The tools cache frequently requested content on the local network and provide a central point for performing content filtering of end-user requests.

Firewalls, on the other hand, act as the "traffic cop" for all inbound and outbound network traffic, ensuring that it meets network security policy. If your networking strategy calls for a proxy server, I would strongly recommend using it in conjunction with a firewall.

That said, some network firewalls combine proxy functionality with packet filtering. These so-called "proxy firewalls" establish connections with local systems on behalf of remote users (and vice-versa), eliminating the direct connection between systems. Such an arrangement allows the proxy firewall to perform content filtering and provide Layer 7 defenses. If you can afford one, these firewalls provide the strongest available level of firewall protection on the market today.

0 comments

Register

Login

Forgot your password?

Your password has been sent to:

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy